ComputerWeekly.com Research Library

Powered by Bitpipe.com

Risk Management Research

  • 2016 Security Predictions

    Sponsored by: TrendMicro

    This article shows you growing trends over the past year plus gives you predictions about cybercrime moving forward. Learn what organizations across industries are doing to curb their risks for attacks and what you can do to prepare yourself for the future of cybercrime.

  • Don't Be the Next Cyber Victim

    Sponsored by: eSentire

    This video teaches you about a solution with micro incident response capability that will protect your network 24/7, 365 days per year. Access now to stop simple breaches from turning into business-ending catastrophes.

  • Accelerate Your Digital Business Through Cybersecurity

    Sponsored by: Dimension Data

    Tune into this video to discover how to leverage cybersecurity to accelerate your digital business. View now to unleash the power of your data with a secure, digital infrastructure and learn how to utilize actionable threat intelligence.

  • eSentire Partner Program

    Sponsored by: eSentire

    This white paper gives you a brief overview of the eSentire partner program and how becoming a partner will allow you to reach new customers, increase revenues, expand your portfolio and grow market share. Access now and learn about their program benefits, requirements and if it is the right fit for you.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    From this case study, learn how the Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Read on to discover how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware

    Sponsored by: BlackBerry

    This white paper takes a deeper look at recent attacks on the government, Aramaco, Sony and others and breaks down what type of malware it was and how it works, measures you can take to mitigate the risk of an attack and considerations for protecting your data on file shares, endpoints and collaborative systems.

  • Deploying an EFSS Solution: Six Steps for Success

    Sponsored by: BlackBerry

    This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.

  • Governing Risk Data Aggregation and Risk Reporting

    Sponsored by: IBM

    It's important that your data is complete, correct, and consistent in order to ensure that your reports are trustworthy, and that you and your colleagues are making business decisions based off of data that is not flawed. Using the banking industry as an example, this resource discusses what governing risk data means for businesses today.

  • Cyber Security Breakdown: What Legal Professionals Need to Know

    Sponsored by: eSentire

    Be proactive against advanced cyber threats before they hit your organization. Access this resource now to learn how you can take the steps necessary to be fully protected.

  • Meeting PCI DSS v3.1 Merchant Requirements with Watchguard UTM and Wireless Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper clearly outlines how firewall deployment impacts PCI DSS standards for a PCI DSS merchant. Access now for tables that include descriptions of PCI DSS standards and how you can achieve these requirements.

  • Tracking the Most Significant Cyber Threat

    Sponsored by: OpenDNS

    This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.

  • Nine steps of a digital transformation journey

    Sponsored by: Hewlett-Packard Enterprise

    This white paper shows you nine steps that can guide evolution within your organization. Design your transformative business model and use the latest technology to create modern architectures all while securing your enterprise.

  • Avoid becoming the catch of the day: Four steps to combat phishing attacks

    Sponsored by: Imprivata

    Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.

  • Turn iOS, Android or BlackBerry Devices into Security Tokens

    Sponsored by: BlackBerry

    In this white paper, you will learn about two-factor user authentication by leveraging passwords and users' devices. Access now and learn how to reduce associated operational costs and increase productivity with a modern authentication system.

  • Securing Mobility Management in the Cloud

    Sponsored by: BlackBerry

    Discover how to securely manage mobile devices and other endpoints across different operating systems ownership models. Learn how to manage your mobile workers' access to apps, data and content, all from a single, easy-to-use console.

  • Federated Access Management: The New Era of Secure Access

    Sponsored by: Ping Identity Corporation

    This white paper teaches you about the evolution of access management and what's driving modern access security requirements. Continue reading to learn about Federated Access Management and discover painless migration strategies to adopt this new breed of access management.

  • Cyber Security 2016 and beyond

    Sponsored by: ComputerWeekly.com

    Cyber risks to businesses increasingly feature in the news as a growing number of companies are targeted by attacks aimed at stealing personal and intellectual property data, but despite this coverage, studies show many companies are still ill-equipped to deal with these attacks.

  • Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper provides business planners with informative details on how to maintain strong security and PCI DSS compliance in a distributed retail environment. Access now for tools on how to keep applications, data and networks safe and PCI DSS compliant.

  • Three ways AirWatch secures mobile Office365 applications

    Sponsored by: VMware

    This e-guide shows how you can better manage busienss applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.

  • VMware identity management adds SSO to AirWatch

    Sponsored by: VMware

    This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.

  • Illuminate Shadow IT and Securely Manage BYOX

    Sponsored by: WatchGuard Technologies, Inc.

    This white paper discusses BYOX and explores strategies and solutions for embracing the business productivity aspects of a BYOX workforce culture. Access now to learn how you can promote a faster, flexible and mobile workforce while protecting your organization from security pitfalls.

  • We’ve Been Breached- Now What?

    Sponsored by: eSentire

    This white paper teaches you how to respond after a cyber threat becomes a cyber attack. Access now to learn how to eradicate cyber threats, repair infected systems and restore operations to normal after an attack occurs.

  • Managed file transfer: Minimizing risk and strengthening compliance in data exchange

    Sponsored by: IBM

    This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.

  • Network security stack: How and why to consider adding new layers

    Sponsored by: OpenDNS

    This e-book teaches you about new tools to fully protect your employees wherever they go. Discover a cloud-delivered security that shores up your defenses and gets in front of attacks even as they increase in sophistication.

  • MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments

    Sponsored by: Vision Solutions

    In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.